
Dears, I have the same problem, but another one error: On my pre-production stand with one node in cluster, I was set hode to maintenance, and after try update cluster to 4.5 i see: Error while executing action: Cannot change Cluster compatibility version where there are no hosts in the Cluster which support that version. ENGINE LOG: 2020-12-11 15:48:26,338+02 INFO [org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) [383d1f09-039d-4737-9e8d-9b2490717bd8] Updating cluster CPU flags and verb according to the configuration of the Intel Westmere Family cpu 2020-12-11 15:48:26,347+02 INFO [org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) [383d1f09-039d-4737-9e8d-9b2490717bd8] Lock Acquired to object 'EngineLock:{exclusiveLocks='[]', sharedLocks='[9abc1d61-829e-470b-b6c8-ad5aec769869=VM]'}' 2020-12-11 15:48:26,389+02 WARN [org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) [383d1f09-039d-4737-9e8d-9b2490717bd8] Validation of action 'UpdateCluster' failed for user smelnyk@internal-authz. Reasons: VAR__TYPE__CLUSTER,VAR__ACTION__UPDATE,CLUSTER_CANNOT_UPDATE_VERSION_WHEN_NO_HOST_SUPPORTS_THE_VERSION 2020-12-11 15:48:26,390+02 INFO [org.ovirt.engine.core.bll.UpdateClusterCommand] (default task-1) [383d1f09-039d-4737-9e8d-9b2490717bd8] Lock freed to object 'EngineLock:{exclusiveLocks='[]', sharedLocks='[9abc1d61-829e-470b-b6c8-ad5aec769869=VM]'}' HOST: OS Version: RHEL - 8.3 - 1.2011.el8 OS Description: CentOS Linux 8 Kernel Version: 4.18.0 - 240.1.1.el8_3.x86_64 KVM Version: 4.2.0 - 34.module_el8.3.0+555+a55c8938 LIBVIRT Version: libvirt-6.0.0-28.module_el8.3.0+555+a55c8938 VDSM Version: vdsm-4.40.35.1-1.el8 SPICE Version: 0.14.3 - 3.el8 GlusterFS Version: [N/A] CEPH Version: librbd1-12.2.7-9.el8 Open vSwitch Version: [N/A] Nmstate Version: nmstate-0.3.6-2.el8 Kernel Features: MDS: (Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable), L1TF: (Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable), SRBDS: (Not affected), MELTDOWN: (Mitigation: PTI), SPECTRE_V1: (Mitigation: usercopy/swapgs barriers and __user pointer sanitization), SPECTRE_V2: (Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling), ITLB_MULTIHIT: (KVM: Mitigation: Split huge pages), TSX_ASYNC_ABORT: (Not affected), SPEC_STORE_BYPASS: (Mitigation: Speculative Store Bypass disabled via prctl and seccomp) VNC Encryption: Disabled FIPS mode enabled: Disabled